Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam Professional Cloud Database Engineer topic 1 question 117 discussion

Actual exam question from Google's Professional Cloud Database Engineer
Question #: 117
Topic #: 1
[All Professional Cloud Database Engineer Questions]

You are configuring the networking of a Cloud SQL instance. The only application that connects to this database resides on a Compute Engine VM in the same project as the Cloud SQL instance. The VM and the Cloud SQL instance both use the same VPC network, and both have an external (public) IP address and an internal (private) IP address. You want to improve network security. What should you do?

  • A. Disable and remove the internal IP address assignment.
  • B. Disable both the external IP address and the internal IP address, and instead rely on Private Google Access.
  • C. Specify an authorized network with the CIDR range of the VM.
  • D. Disable and remove the external IP address assignment.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Pime13
2 weeks, 2 days ago
Selected Answer: D
D: gcp best practices, not use internal ip unless strickly necessary
upvoted 1 times
...
nmnm22
1 month, 3 weeks ago
Selected Answer: D
D makes most sense
upvoted 1 times
...
learnazureportal
8 months, 1 week ago
The correct answer is C. Specify an authorized network with the CIDR range of the VM.
upvoted 3 times
ArtistS
5 months ago
They are already in the same VPC, why do you want to create another authorized network????
upvoted 1 times
...
...
dynamic_dba
1 year, 2 months ago
D. It is always more secure to use an internal IP, so removing them doesn’t make sense. Eliminate A. You can use Private Google Access when VM instances only have internal IP addresses, so disabling the internal IPs and use Private Google Access doesn’t make sense. Eliminate B. Specifying an authorized network when they’re on the same subnet doesn’t make sense. Eliminate C. A way to improve network security would be to disable external IPs since they’re not needed.
upvoted 2 times
...
SandyZA
1 year, 4 months ago
D as both are in VPC they can communicate internally. Private Google Access enabled allows VM instances which only have internal IP addresses (no external IP addresses) to reach the external IP addresses of Google APIs and services
upvoted 2 times
...
SVGoogle89
1 year, 4 months ago
D. Within VPC, all traffic is open
upvoted 1 times
...
chelbsik
1 year, 4 months ago
Selected Answer: D
B is not applicable here because Private Google Access requires internal IP address.
upvoted 4 times
...
pk349
1 year, 4 months ago
B: Disable both the external IP address and the internal IP address, and instead rely on *** Private Google Access.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...